SSH is a Swiss Army knife and Hogwart's magic wand all rolled into one
simple command-line tool. As often as we use it, we sometimes forget that
even our encrypted friend can be secured more than it...

Typically when a network is under my control, I like my servers to have
static IPs. Whether the IPs are truly static (hard-coded into network
configuration files on the host) or whether I configure a DHCP server to make static
assignments, it's far more convenient when you know a server always will have
the same IP. more>>

Large enterprises and nuclear laboratories aren't the only organizations
that need an Internet access policy and a means of enforcing it. My
household has an Internet access policy, and the technique I've used to
enforce it is applicable to almost any organization. In our case, I'm not
too concerned about outside security threats. more>>

Many problems in science and engineering are modeled through ordinary
differential equations (ODEs). An ODE is an equation that contains a
function of one independent variable and its derivatives. more>>

It sounds like a "back in my day" story, but I really do miss the days
when laptops had LED activity lights for hard drives and Wi-Fi. Sure,
some still have them, but for the most part, the latest trend is to have
no way of knowing if your application is pegging the CPU at 100%, or if
it just locked up.
more>>

I love my latest Android device (see the March 2015 issue's Open-Source Classroom
column for details), but for some reason, it won't automatically connect
to my Bluetooth headset. When I turn on my headset, I want it to connect
to my Android device so I can start using it right away. more>>

Nicolas Dichtel and Thierry Herbelot pointed out that the directories
in the /proc filesystem used a linked list to identify their files.
But, this would be slow when /proc directories started having lots of
files, which, for example, might happen when the system needed lots of
network sockets.
more>>

When I was growing up, my father always said, "Work smarter, not harder." Now that I'm an adult, I've found that to be a core concept in my career as a DevOps engineer and manager. In order to work smarter, you've got to have good tools and technology in your corner doing a lot of the repetitive work, so you and your team can handle any exceptions that occur. more>>

If SSH is the Swiss Army knife of the system administration world, Nmap
is a box of dynamite. It's really easy to misuse dynamite and blow your
foot off, but it's also a very powerful tool that can do jobs that
are impossible without it.
more>>

1999 was a crazy year for business on the Internet, and for Linux. It was
when Red Hat went public, with a record valuation, and VA Linux followed
with a bigger one. Both were cases in point of the dot-com boom, a
speculative bubble inflated by huge expectations of what the Internet would
mean for business.
more>>

In recent years, there has been a trend in which data centers have been
opting for commodity hardware and software over proprietary solutions. Why
shouldn't they? It offers extremely low costs and the flexibility to
build an ecosystem the way it is preferred. The only limitation is the extent
of the administrator's imagination. more>>

Is it weird to say that DNS is my favorite protocol? Because DNS
is my
favorite protocol. There's something about the simplicity of UDP packets
combined with the power of a service that the entire Internet relies on
that grabs my interest. Through the years, I've been impressed with just how
few resources you need to run a modest DNS infrastructure for an internal
network. more>>

Trending Topics

Webinar: 8 Signs You’re Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
11am CDT, April 29th

Join Linux Journal and Pat Cameron, Director of Automation Technology at HelpSystems, as they discuss the eight primary advantages of moving beyond cron job scheduling. In this webinar, you’ll learn about integrating cron with an enterprise scheduler.